Trojan

Trojan.Dropper.Delf.BB (B) malicious file

Malware Removal

The Trojan.Dropper.Delf.BB (B) is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Trojan.Dropper.Delf.BB (B) virus can do?

  • Sample contains Overlay data
  • Authenticode signature is invalid
  • Anomalous binary characteristics

How to determine Trojan.Dropper.Delf.BB (B)?


File Info:

name: 0EF91CF17A767E1E5276.mlw
path: /opt/CAPEv2/storage/binaries/f4d0702888510b197514f69c7c1eb3e0b25dcb9eb35f972cb0b3dd25d7b53375
crc32: C3A6DB8F
md5: 0ef91cf17a767e1e5276e52c623f0d79
sha1: 0a995fc8f45fa9bdb9e4be6411edaba16f544fcc
sha256: f4d0702888510b197514f69c7c1eb3e0b25dcb9eb35f972cb0b3dd25d7b53375
sha512: 1be181c10cfd9f513288f2fa804fe643f4b593bdd940557eac7655430f82e5938837cdccadccc9a7734759dccd4dafcbe54b9e59b7cda33f25989a1302fdf214
ssdeep: 98304:YrtirtitStWrtirtitStnrtirtitSt4t7t:820Ey20EJ20E25
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T153E58D07A7D0D876D0B29A781E3993309E3B7E305E79A3CB66A4EF8E5C352854D18317
sha3_384: 5ab1bb088356eb07822e8a230952873894ea5179341979a6eae426a6220964bd8bb8160cf5b04e04c9ca52bd0b2d1773
ep_bytes: 6a706888180001e8bc01000033db538b
timestamp: 2001-08-17 20:52:29

Version Info:

CompanyName: Microsoft Corporation
FileDescription: Notepad
FileVersion: 5.1.2600.0 (xpclient.010817-1148)
InternalName: Notepad
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFilename: NOTEPAD.EXE
ProductName: Microsoft® Windows® Operating System
ProductVersion: 5.1.2600.0
Translation: 0x0409 0x04b0

Trojan.Dropper.Delf.BB (B) also known as:

BkavW32.AIDetect.malware2
LionicWorm.Win32.Fesber.lUza
tehtrisGeneric.Malware
MicroWorld-eScanTrojan.Dropper.Delf.BB
ClamAVWin.Worm.Yero-1
FireEyeGeneric.mg.0ef91cf17a767e1e
CAT-QuickHealWorm.Fesber.13050
ALYacTrojan.Dropper.Delf.BB
CylanceUnsafe
SangforTrojan.Win32.Save.a
K7AntiVirusEmailWorm ( 0025a5241 )
K7GWEmailWorm ( 0025a5241 )
Cybereasonmalicious.17a767
BaiduWin32.Worm.Agent.g
CyrenW32/Fesber.D.gen!Eldorado
SymantecML.Attribute.HighConfidence
Elasticmalicious (high confidence)
ESET-NOD32multiple detections
APEXMalicious
CynetMalicious (score: 100)
KasperskyWorm.Win32.Fesber.g
BitDefenderTrojan.Dropper.Delf.BB
NANO-AntivirusTrojan.Win32.Fesber.fjhfvl
AvastWin32:Agent-AVCC [Trj]
TencentWin32.Worm.Fesber.frl
SophosML/PE-A + Mal/Fesber-A
ComodoTrojWare.Win32.Cosmu.Z@2wye6j
DrWebWin32.HLLW.FSB
VIPRETrojan.Dropper.Delf.BB
TrendMicroWORM_YERO.A
McAfee-GW-EditionBehavesLike.Win32.Fareit.wm
EmsisoftTrojan.Dropper.Delf.BB (B)
SentinelOneStatic AI – Malicious PE
GDataWin32.Trojan.PSE.MBHB1U
AviraWORM/Fesber
MAXmalware (ai score=89)
KingsoftWin32.Troj.Generic.a.(kcloud)
ZoneAlarmWorm.Win32.Fesber.g
MicrosoftTrojan:Win32/Bumat!rts
GoogleDetected
AhnLab-V3Win-Trojan/Xema.9630928
McAfeeW32/Worm-FUS!0EF91CF17A76
VBA32Virus.Fsb.1
MalwarebytesBladabindi.Backdoor.Njrat.DDS
TrendMicro-HouseCallWORM_YERO.A
RisingWorm.Fesber!1.65A8 (CLASSIC)
YandexTrojan.GenAsa!EKe4anrraVI
IkarusWorm.Win32.Fesber
MaxSecureTrojan.W32.Fesber.G
FortinetW32/Fesber.G!worm
BitDefenderThetaGen:NN.ZelphiF.34606.amGfaC!@D6b
AVGWin32:Agent-AVCC [Trj]
PandaTrj/CI.A
CrowdStrikewin/malicious_confidence_90% (W)

How to remove Trojan.Dropper.Delf.BB (B)?

Trojan.Dropper.Delf.BB (B) removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment